{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:45:31Z","timestamp":1764783931815,"version":"build-2065373602"},"reference-count":21,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T00:00:00Z","timestamp":1487289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61201371"],"award-info":[{"award-number":["61201371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Shandong Province, China","award":["ZR2015PF004"],"award-info":[{"award-number":["ZR2015PF004"]}]},{"name":"Research Award Fund for Outstanding Young and Middle-Aged Scientists of Shandong Province, China","award":["BS2013DX022"],"award-info":[{"award-number":["BS2013DX022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Digital image authentication has become a hot topic in the last few years. In this paper, a pixel-based fragile watermarking method is presented for image tamper identification and localization. By analyzing the left and right singular matrices of SVD, it is found that the matrix product between the first column of the left singular matrix and the transposition of the first column in the right singular matrix is closely related to the image texture features. Based on this characteristic, a binary watermark consisting of image texture information is generated and inserted into the least significant bit (LSB) of the original host image. To improve the security of the presented algorithm, the Arnold transform is applied twice in the watermark embedding process. Experimental results indicate that the proposed watermarking algorithm has high security and perceptual invisibility. Moreover, it can detect and locate the tampered region effectively for various malicious attacks.<\/jats:p>","DOI":"10.3390\/a10010027","type":"journal-article","created":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T12:10:34Z","timestamp":1487333434000},"page":"27","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Fragile Watermarking for Image Authentication Using the Characteristic of SVD"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1864-5432","authenticated-orcid":false,"given":"Heng","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0901-2492","authenticated-orcid":false,"given":"Chengyou","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1331-7379","authenticated-orcid":false,"given":"Xiao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,2,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","article-title":"A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization","volume":"30","author":"Qi","year":"2015","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1109\/LSP.2007.896436","article-title":"Statistical fragile watermarking capable of locating individual tampered pixels","volume":"14","author":"Zhang","year":"2007","journal-title":"IEEE Signal Proc. Lett."},{"key":"ref_3","first-page":"18","article-title":"Image authentication for a slippery new age","volume":"20","author":"Walton","year":"1995","journal-title":"Dr Dobb\u2019s J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","article-title":"A watermarking-based image ownership and tampering authentication scheme","volume":"27","author":"Chang","year":"2006","journal-title":"Pattern Recognit. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3493","DOI":"10.1016\/j.patcog.2008.05.009","article-title":"Tampering with a watermarking-based image authentication scheme","volume":"41","author":"Phan","year":"2008","journal-title":"Pattern Recognit."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1016\/j.eswa.2007.11.018","article-title":"A fuzzy c-means clustering-based fragile watermarking scheme for image authentication","volume":"36","author":"Chen","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3026","DOI":"10.1016\/j.sigpro.2010.04.027","article-title":"Reversible fragile watermarking for locating tampered blocks in JPEG images","volume":"90","author":"Zhang","year":"2010","journal-title":"Signal Proc."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","article-title":"Fast communication: Fragile watermarking scheme using a hierarchical mechanism","volume":"89","author":"Zhang","year":"2009","journal-title":"Signal Proc."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.amc.2006.07.036","article-title":"An image fragile watermark scheme based on chaotic image pattern and pixel-pairs","volume":"185","author":"Liu","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","article-title":"A chaotic system based fragile watermarking scheme for image tamper detection","volume":"65","author":"Rawat","year":"2011","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1016\/j.aeue.2012.12.001","article-title":"Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme","volume":"67","author":"Teng","year":"2013","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","article-title":"Chaotic watermark for blind forgery detection in images","volume":"75","author":"Benrhouma","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.aeue.2015.10.006","article-title":"Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images","volume":"70","author":"Zhou","year":"2016","journal-title":"AEU\u2014Int. J. Electron. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/LSP.2010.2090041","article-title":"Binocular just-noticeable-difference model for stereoscopic images","volume":"18","author":"Zhao","year":"2011","journal-title":"IEEE Signal Proc. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1016\/j.imavis.2006.07.004","article-title":"A variation on SVD based image compression","volume":"25","author":"Ranade","year":"2007","journal-title":"Image Vis. Comput."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.engappai.2015.12.004","article-title":"Robust and false positive free watermarking in IWT domain using SVD and ABC","volume":"49","author":"Ansari","year":"2016","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","article-title":"False-positive-free SVD-based image watermarking","volume":"25","author":"Guo","year":"2014","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1016\/j.image.2014.09.001","article-title":"An effective SVD-based image tampering detection and self-recovery using active watermarking","volume":"29","author":"Dadkhah","year":"2014","journal-title":"Signal Proc. Image Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3680","DOI":"10.1016\/j.optcom.2009.06.014","article-title":"Optical color image encryption based on Arnold transform and interference method","volume":"282","author":"Chen","year":"2009","journal-title":"Opt. Commun."},{"key":"ref_20","first-page":"317","article-title":"Digital watermarking scheme based on Arnold and anti-Arnold transforms","volume":"Volume 9680","author":"Elayan","year":"2016","journal-title":"Proceedings of the International Conference on Image and Signal Processing, Lecture Notes in Computer Science"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","article-title":"Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities","volume":"91","author":"Solorio","year":"2011","journal-title":"Signal Proc."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/1\/27\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:28:34Z","timestamp":1760207314000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/1\/27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,17]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,3]]}},"alternative-id":["a10010027"],"URL":"https:\/\/doi.org\/10.3390\/a10010027","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2017,2,17]]}}}